CVE Vulnerabilities

CVE-2017-3143

Published: Jan 16, 2019 | Modified: Nov 21, 2024
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.

Affected Software

NameVendorStart VersionEnd Version
BindIsc9.4.0 (including)9.8.8 (including)
BindIsc9.9.0 (including)9.9.10 (including)
BindIsc9.10.0 (including)9.10.5 (including)
BindIsc9.11.0 (including)9.11.1 (including)
BindIsc9.9.0-p1 (including)9.9.0-p1 (including)
BindIsc9.9.3-s1 (including)9.9.3-s1 (including)
BindIsc9.9.10-s2 (including)9.9.10-s2 (including)
BindIsc9.10.5-p1 (including)9.10.5-p1 (including)
BindIsc9.10.5-s1 (including)9.10.5-s1 (including)
BindIsc9.10.5-s2 (including)9.10.5-s2 (including)
BindIsc9.11.1-p1 (including)9.11.1-p1 (including)
Red Hat Enterprise Linux 6RedHatbind-32:9.8.2-0.62.rc1.el6_9.4*
Red Hat Enterprise Linux 7RedHatbind-32:9.9.4-50.el7_3.1*
Bind9Ubuntuartful*
Bind9Ubuntudevel*
Bind9Ubuntuesm-infra-legacy/trusty*
Bind9Ubuntuesm-infra/xenial*
Bind9Ubuntutrusty*
Bind9Ubuntutrusty/esm*
Bind9Ubuntuvivid/ubuntu-core*
Bind9Ubuntuxenial*
Bind9Ubuntuyakkety*
Bind9Ubuntuzesty*

References